title: Suspicious RASdial Activity description: Detects suspicious process related to rasdial.exe status: experimental references: - https://twitter.com/subTee/status/891298217907830785 author: juju4 tags: - attack.defense_evasion - attack.execution - attack.t1064 logsource: category: process_creation product: windows detection: selection: CommandLine: - rasdial condition: selection falsepositives: - False positives depend on scripts and administrative tools used in the monitored environment level: medium